Information#
Version#
By | Version | Comment |
---|---|---|
noraj | 1.0 | Creation |
CTF#
- Name : European Cyber Week CTF Quals 2016
- Website : challenge-ecw.fr
- Type : Online
- Format : Jeopardy - Student
Description#
N.A.
Solution#
We used Digital Forensics Framework (DFF)
We can view that usb.dd is NTFS partition in the hex view so we mounted it as it.
We browsed the files and this one retaind our attention: usb.dd/NTFS/Users/windows/Documents/tmp_rqsu78.docx:flag
.
Its content is:
'Get the data from the default value of the key HKLM\SYSTEM\CurrentControlSet\Control\DeviceContainers\{000001111-2345178-232416-99801}'
So we need to find Windows registry and browse it.
The location of these registry hives are as follows:
HKEY_LOCAL_MACHINE \SYSTEM
:\system32\config\system
Source: http://www.thewindowsclub.com/where-are-the-windows-registry-files-located-in-windows-7
We browsed it and the value of the key was: a2486aac827711258d0642176cc4f8c2
.
So the flag is ECW{a2486aac827711258d0642176cc4f8c2}
.
Bonus:
/Logical files/temp/usb.dd/NTFS/!j3CtfuSD5zz1RfB=MlsL]u-k8O5v+,P
was certainly the target location of the attack.- There was also a
no flag here.txt
troll file inWindows\system32\config\
containing a pretty list of fake flags:
ECW{ee4f493d149e634540b79ed030b3790e}
ECW{ef20996f87a1c172223d1796f155cabb}
ECW{78a4b8dd2614fea24d694aaad4e5ee7c}
ECW{2942e64a0b3836b84aa18311be73804d}
ECW{860d8070c9fed931856856b2957316d9}
ECW{5c07ee2b8313b406a32325c7a2924011}
ECW{20b1ab287f9f4485800b15ba9cb933b0}
ECW{31470d8d9676ee5d17fe79317124d67a}
ECW{c0ad5adadd6dc5871f4cc66370757d9a}
ECW{d28aeba8bb169a6f628d77b7059e9110}
ECW{c9f619827e73ce3d61048b0ddb49ec84}
ECW{07c563dd9f91b19a18d8876e89188593}
ECW{46f8ba8cd62e3334e05501407d653587}
ECW{d55e0d52fa7c5ccb0af9efa488f5206d}
ECW{269c20f280f7326c674811f59ece9cab}
ECW{656122abbb817863ae145539bb0eeb03}
ECW{d1b46e0fa5e5c0375ade62ff820ce631}
ECW{62fd1f329ac8d59e6c4052e45b6121bf}
ECW{c4393a542ae85e178cf7da6cee80139d}
ECW{0ae1fcf8c1b5e378ba62736d59ab346c}
ECW{31e42f6a1adeb6350cda9270c164855f}
ECW{6a1dd34361fe943af6a4c4a71584ac2f}
ECW{bc65d36be9d0c6877cc0b200002e4e2d}
ECW{a0a7c3fff21f2aea3cfa1d0316dd816c}
ECW{4cf2d64e44205fe628ddd534e1151b58}
ECW{9cc72dc973e24f9623bd3fe708f60ef5}
ECW{579a3c1e12a1e74a98169175fb913012}
ECW{2b7ea5cee3c49ff53d41e00785eb974c}
ECW{a4a7e457b55b5ac2877f7973dbba37e9}
ECW{01b1688f97f94776baae85d77b06048b}
ECW{9b64ca5761c6de555d7d1b3c948ecfeb}
ECW{3ff6ba9cf6d8e5332978e057559b5562}
ECW{7dfe15854212a30f346da5255c1d794b}
ECW{f51b02427757e79621b5235d7efdf117}
ECW{e0e8b9912a4793170fd23f7aa4c6d68c}
ECW{036208b4a1ab4a235d75c181e685e5a3}
ECW{a51a588dc98a55fbbb26cf2f64589bda}
ECW{a51a588dc98a55fbbb26cf2f64589bda}
ECW{a51a588dc98a55fbbb26cf2f64589bda}
ECW{7fad9816d7334cc470e5dc82d06e222f}
ECW{d69fc8c97d906264c98463b4bca59fd4}
ECW{5088741fd5456ef3471fe11022575e03}
ECW{4d3f80683b3b9021f517e5b9920d0126}
ECW{73a00957034783b7b5c8294c54cd3e12}
ECW{1f77c389e0a69652980c341170d0834b}
ECW{b42d4ed9a6bf5cda33366c01be5d11cb}
ECW{c9440da5b11074fca7966ecde2fe3c97}
ECW{6258191d167c56dcdb51ae9fa2faee23}
ECW{095fd6a167e3c0f7331a1a6b97969c83}
ECW{40942c14fbaaff0523b88ab781900cfd}
ECW{39e14ad7477262c347f2e6d927a6518c}
ECW{cdfb31c9bd2ea0c6d87206224466ac75}
ECW{663f929002e1547fd2bf67e72f1b85e0}
ECW{2eedce1bca0150e3dcda7e77f4d8ecfd}
ECW{35b88728559e409dd550eb818228c99e}
ECW{469966e739df10b55c3c8ee3ad572617}
ECW{5146da32deef5fee7df9461eeca13e7b}